Telegram Sniper Detector
Many of the most aggressive buys on new tokens aren’t random — they’re triggered by Telegram. Deployers leak info to private chats, snipers monitor KOL groups, and wallets flood in the second a new project is mentioned. The Telegram Sniper Detector module in Forge was built to catch this exact behavior.
It links wallet activity to group joins, traces deployer movements across Telegram communities, and helps you understand if a meme is being farmed by insiders.
What It Does
This module monitors:
Known Telegram groups where snipers and KOLs gather
Wallets linked to those groups
Deployers who join groups before launching tokens
Timing between group joins and token buys
Repeat wallet appearances across multiple launches
It detects Telegram-connected behavior, which often signals insider coordination, KOL baiting, or stealth sniper farms.
Wallet Linking
Wallets are linked to Telegram using:
Wallet signatures inside group chats (via DegenBox bots, snipe groups, sniper bot wallets)
Links between deployers and known group metadata
Funding patterns tied to sniper bot clusters
Once a wallet is identified in a group, Forge tracks when it:
Joins a chat
Sends messages (if available)
Buys tokens shortly after
Deploys a token with metadata posted in the group
How It Helps
Ask a question like:
“Any Telegram links for this token?”
Forge might respond:
“Token $WARP was deployed by wallet 7AuCty3w..., which joined ‘SolanaAlphaHub’ 1 hour before launch. First 3 buyers also present in same group. Pattern matches previous sniper farm setups.”
You can also run standalone queries like:
“What tokens were launched by Telegram-linked wallets today?”
“Which Telegram group is most active in fresh launches?”
“Has this wallet joined any snipe groups?”
Detection Use Cases
This module is especially useful for:
Sniper Identification – flagging wallets that follow every KOL call
Insider Bait Detection – catching tokens pushed in chats before they rug
Deployer Monitoring – seeing if a dev is part of known rug circles
Front-Run Tracing – identifying wallets that buy tokens seconds after group joins
Telegram Join Timing
Forge analyzes the timing between a wallet joining a group and:
A token deployment
First token buys
Sniper wallet movements
If these events happen within 1–10 minutes, it’s flagged as high correlation.
Example output:
“Wallet 9xTzK5... joined 'AlphaSnipers' 3 minutes before buying $DOGEZILLA. Bought 2 seconds after launch. Known repeat pattern across 8 tokens.”
Group Metadata
Each Telegram group tracked by Forge includes:
Group name and alias
Description (KOL, sniper hub, launchpad group, etc.)
Linked wallet activity
Risk rating (based on rug frequency from members)
This lets you track which groups are the most predictive — or the most dangerous.
Custom Group Tracking
If you run a private Forge instance, you can add:
Your own list of Telegram groups
Custom rules for detection
Blacklist or whitelist filters
Alerts for wallets joining tracked chats
You can even run daily reports on what groups were most active in launching or sniping tokens.
Last updated